Wired mag article on spammers playing traceroute games with trojaned boxes

Laurence F. Sheldon, Jr. larrysheldon at cox.net
Fri Oct 10 00:44:35 UTC 2003


Margie Arbon wrote:

> I am curious as to why open proxies, compromised hosts, trojans and
> routing games are not considered operational issues simply because
> the vehicle being discussed is spam.
> 
> With all due respect, we have a *problem*. End user machines on
> broadband connections are being misconfigured and/or compromised in
> frightening numbers.  These machines are being used for everything
> from IRC flooder to spam engines, to DNS servers to massive DDoS
> infrastructure. If the ability of a teenager to launch a gb/s DDoS,
> or of someone DoSing mailservers off the internet with a trojan that
> contains a spam engine is not operational, perhaps it's just me
> that's confused.
> 
> Two-three years ago the warnings were ignored because it was only
> IRC. Now it's only spam.  What does it take to make the Network
> Operators and NANOG decide that things that are a "very bad thing" on
> one protocol generally can bite you later on another if you ignore it
> because it's only <insert your least favorite program or protocol
> here>?

I believe that to be one of the most succint summaries of the issues
as I have read.



More information about the NANOG mailing list